The CINS Blog

Intrusion Prevention, Threat Intelligence, and all things Network Security.

Spear Phishing – It Can Happen to Anyone

Last update on Feb. 6, 2017.

I’ve been in the Network Security industry for more than 20 years, which may be the only reason my entire life was not compromised.


Continue reading

Why We Sponsor the CINS Army Initiative

Last update on Jan. 10, 2017.

The Concept

By now, you may have heard of our CINS Army Initiative. (CINS stands for Collective Intelligence Network Security.)


Continue reading

Sentinel IPS Launches CINS Army New Initiative

Last update on Dec. 20, 2016.

        FOR RELEASE Contact: Ginny McAdams +1.972.991.5005 x114 [email protected]     Sentinel IPS Launches CINS Army New Initiative Using specific and actionable data to strengthen collective IT network security   DALLAS – Dec. 13, 2016 – Sentinel IPS, a long-time sponsor of the Collective Intelligence Network Security (CINS) Army, announces a new…


Continue reading

It’s All About Context – Night Club Part Deux

Last update on Dec. 2, 2016.

THE BOUNCER GUY COMPARISON

Deep packet inspection versus firewall protection aka The Bouncer.


Continue reading

It’s all about the atTIrE

Last update on Nov. 7, 2016.

THE NECKTIE ANALOGY

When is a necktie requirement more like a network security noose? Read on to find out how the best ruleset intentions can go awry and how Sentinel IPS protects your network....


Continue reading

National Cyber Security Awareness Month

Last update on Oct. 7, 2016.

Did you know October is National Cyber Security Awareness Month? It’s an annual campaign to raise awareness of cybersecurity sponsored by the Department of Homeland Security...


Continue reading

The Fallacy of “How Likely Are You to Recommend…to Your Friends and Colleagues?”

Last update on Jan. 30, 2017.

You will probably find this question at the end of a blog, on an online “submit” form, on a customer ticket, or any other service-related web page you use daily. “How likely are you to recommend THIS WHATEVER to your friends and colleagues?” Then, you are given choices from “extremely unlikely” to “extremely likely.” However,…


Continue reading

The Emergence of Cryptoworms Shouldn’t Alter Your Security Methods

Last update on Jan. 26, 2017.

One of the most confusing aspects of malware is that infiltrators never devised a better method of getting their software onto networks. Up to this point, ransomware and malware developers have relied on phishing emails and watering holes (targeted, compromised web sites hosting malicious code) as delivery methods; depending on trickery and the end user’s…


Continue reading

Ransomware’s Evolving, But You Can Beat It

Last update on Jan. 26, 2017.

A quick bit of background before we dive into the topic of today’s post — the evolution of ransomware. What follows is an admittedly incomplete list of the evolutions and variants of the Cryptolocker virus. Cryptolocker — The granddaddy. Infections occurred through spam, fishing and exploit kits. It was famously taken down by Operation Tovar.…


Continue reading

Network Security Spring Clean: Be Bold, and Boot That Box (Pun Intended)

Last update on Jan. 26, 2017.

Today, in the final installment of our Security Spring Clean series, we encourage you to be bold. We are going to guess, and we think we will be right, that somewhere in the back corner of your server room there’s a box that has been plugged into the switch since no one knows when. Another…


Continue reading